If you do provide consent, you may change your mind and unsubscribe at any time. If you would like to unsubscribe or have any questions, you can click on the unsubscribe links in our messages or contact us using the information below. For information about how we use information you provide to us, please read our Privacy Policy.

For Canadian Residents: By providing your consent below, you are expressly agreeing that we may email you under Canada's Anti-Spam Law. For more information on this law, you may visit the Government of Canada's site.

For European Union Residents: By providing your consent below, you are expressly agreeing that we may email you under European Union General Data Protection Regulation (Regulation (EU) 2016/679). For more information on this regulation, you may visit the European Union's site. Additional details.

You know about us, now we want to get to know you!

Check your mail

We've sent an email to . Please verify that you have received the email.

We have resent the email to

Let's personalize your content

Use social media to find articles

We can use your profile and the content you share to understand your interests and provide content that is just for you.

Turn this off at any time. Your social media activity always remains private.

Connection successful!Connect to LinkedIn

Let's get even more personalized

Choose topics that interest you.

So, what do you do?

Are you sure you want to cancel your subscriptions?

Changing Country?

Accept Terms & Conditions

It looks like you are changing your country/region of residence. In order to receive our emails, you must expressly agree. You can unsubscribe at any time by clicking the unsubscribe link at the bottom of our emails.

You appear to have previously removed your acceptance of the Terms & Conditions.

If you do provide consent, you may change your mind and unsubscribe at any time. If you would like to unsubscribe or have any questions, you can click on the unsubscribe links in our messages or contact us using the information below. For information about how we use information you provide to us, please read our Privacy Policy.

For Canadian Residents: By providing your consent below, you are expressly agreeing that we may email you under Canada's Anti-Spam Law. For more information on this law, you may visit the Government of Canada's site.

For European Union Residents: By providing your consent below, you are expressly agreeing that we may email you under European Union General Data Protection Regulation (Regulation (EU) 2016/679). For more information on this regulation, you may visit the European Union's site. Additional details.

We noticed that you changed your country/region of residence; congratulations! In order to make this change, you must accept the Aggregage Terms and Conditions and Privacy Policy. Once you've accepted, then you will be able to choose which emails to receive from each site.

You appear to have previously removed your acceptance of the Terms & Conditions.

If you do provide consent, you may change your mind and unsubscribe at any time. If you would like to unsubscribe or have any questions, you can click on the unsubscribe links in our messages or contact us using the information below. For information about how we use information you provide to us, please read our Privacy Policy.

For Canadian Residents: By providing your consent below, you are expressly agreeing that we may email you under Canada's Anti-Spam Law. For more information on this law, you may visit the Government of Canada's site.

For European Union Residents: By providing your consent below, you are expressly agreeing that we may email you under European Union General Data Protection Regulation (Regulation (EU) 2016/679). For more information on this regulation, you may visit the European Union's site. Additional details.

If you do provide consent, you may change your mind and unsubscribe at any time. If you would like to unsubscribe or have any questions, you can click on the unsubscribe links in our messages or contact us using the information below. For information about how we use information you provide to us, please read our Privacy Policy.

For Canadian Residents: By providing your consent below, you are expressly agreeing that we may email you under Canada's Anti-Spam Law. For more information on this law, you may visit the Government of Canada's site.

For European Union Residents: By providing your consent below, you are expressly agreeing that we may email you under European Union General Data Protection Regulation (Regulation (EU) 2016/679). For more information on this regulation, you may visit the European Union's site. Additional details.

Let's get even more personalized

Choose topics that interest you.

The policy was spearheaded by the department chair, Nancy Cheever, who is part of a team at the university investigating digital distraction, an issue that, for many teachers, has graduated from a nuisance into a serious threat to learning. Related: Getting schooled in socialmedia. MORE

While this blog is based on verifiable data, some readers may be unhappy with my interpretation. These ads were released by the US Congress as being traced back to Russian origin, although they were liked and reshared by many Americans on socialmedia. immigration policies? MORE

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps. MORE

The ultimate learning experience for students is both highly collaborative and extremely personalized, supported by mobile devices and digital content, reports Project Tomorrow in their latest Speak Up report. MORE

Some individuals simply can’t afford it, while others don’t have the skill or time to navigate the array of complex policy offerings. To reach them, BIMA has partnered with mobile operators who’ve already built relationships with these potential customers. It works like this: BIMA targets individuals who already have mobile plans, essentially piggy-backing off of the trust that has been built between customers and their mobile operators. MORE

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps. MORE

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps. MORE

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps. MORE

As teachers, we all have assumptions -- and likely some opinions -– about teenagers and socialmedia. This week, Common Sense is releasing its latest research report, SocialMedia, Social Life: Teens Reveal Their Experiences , a deep dive into the socialmedia habits of American teenagers. This research is the second wave in an ongoing study tracking teens' attitudes about socialmedia; we released our original report in 2012. MORE

Everywhere we go, here and there, people always seem to have a mobile device in their hands, be it a smartphone or a tablet. It’s almost a sin not to own a mobile device. Our mobile devices are online 24/7. People in a café now usually ask the staff for the Wi-Fi password, and if there’s no Wi-Fi one can always tap the power of cellular data and stay connected to friends. Mobile learning of course. MORE

Omaha received word that a string of text messages were posted on socialmedia threatening violence to a school. We can learn much from each other in practice and policy to ensure student data privacy stays on the forefront. First, socialmedia did not help the situation. MORE

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps. MORE

The increasing rate of students’ digital information being exposed can be, in part, chalked up to a lack of formal training and establishment of cybersecurity policies across educational institutions. When it comes to data privacy, it’s important to remain aware and be proactive. MORE

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps. MORE

Digital footprints are not exclusive to online shoppers or avid socialmedia users; everyone has one, including your 5-year-old child. However, “age limits” did not stop persistent pre-teens from joining socialmedia and gaming sites. MORE

Not long ago, mobile devices were considered perfect for any past-time activity, and had no place in the classroom. Students can play games, watch stupid videos, browse inappropriate websites, spend time on socialmedia, or catch up on the latest episodes of their favorite series. MORE

At Verizon Innovative Learning Schools , every student receives a device with a data plan to support learning in and out of the classroom. Help students and families find wifi to conserve LTE data and support other devices. Remind staff about student data privacy and security. MORE

As teachers, we all have assumptions -- and likely some opinions -– about teenagers and socialmedia. This research is the second wave in an ongoing study tracking teens' attitudes about socialmedia; we released our original report in 2012. MORE

As teachers, we all have assumptions -- and likely some opinions -– about teenagers and socialmedia. This week, Common Sense is releasing its latest research report, SocialMedia, Social Life: Teens Reveal Their Experiences , a deep dive into the socialmedia habits of American teenagers. This research is the second wave in an ongoing study tracking teens' attitudes about socialmedia; we released our original report in 2012. MORE

I created the Digital Parenting Bingo card as a way to easily show some talking points for parents that are dealing with either school-issued devices and/or personal mobile devices. Spot check the photo roll – Many of today’s socialmedia apps are very photo-driven. MORE

ALA’s Policy Statement on Privacy reminds us. In its Q&A on Ethics and SocialMedia, ALA shares: As an institution, a library possesses the same ethical obligation regarding patron education and socialmedia as it does toward information presented in any format. MORE

All their suppliers must comply with this linguistic policy because even in high-tech areas, linguistics count, and many highly paid language analysts are employed. . Second, social-emotional learning is the single biggest tech trend in software. . By LeiLani Cauthen. MORE

The definition of asynchronous learning helps us understand the need for asynchronous access to this content, especially when this access is not through a dated university learning management system, but something more authentic to the student, maybe even accessed on their own mobile devices. MORE

Laptops, Chromebooks, iPads, and even cell phones are providing students with opportunities to access the internet for researching, communicating and social learning. Technology has become an integral element in our students’ educational journey. MORE

Then, share the resulting data and respond to the concerns of participants so that the meeting can continue positively and productively. Teachers: Model appropriate etiquette with edtech for students When I work with teachers, one obstacle they say is in the way of them letting students use mobile devices every day in their classrooms is the distraction factor. Always follow the district socialmediapolicies, but consider starting a department or team Instagram account. MORE

Blog posts, socialmedia posts, images from conferences, articles, videos, you might be surprised at what you will find. 50/75/100 words are perfect for conference session proposals and socialmedia. Review these policies and talk to kids about them too. MORE

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps. MORE

Pokémon Go, a free augmented reality game developed by Niantic (a company spun out of Google in 2015), became the most popular mobile game in US history this year. Pokémon Go generated more than $160 million by the end of July, hitting $600 million in revenue within its first 90 days on the market – the fastest mobile game to do so. Many students cannot afford the heavy data usage required by geofencing apps, for starters. To data about students’ sexual identity? MORE

Why K–12 Students Need to Be Taught to Guard Their Data Online. A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. MORE

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps. MORE

The latest data from Speak Up Research Project gives insights on school to home communications. In addition, she leads several other research efforts on the impact of mobile devices, digital content and blended learning models in both K-12 and higher education. MORE

As school districts search for ways to archive new data sources such as socialmedia and mobile, Google is building self-driving cars and doesn’t seem too worried about data governance for photos, Docs and other files stored in Drive. MORE

As teachers, we all have assumptions -- and likely some opinions -– about teenagers and socialmedia. This week, Common Sense is releasing its latest research report, SocialMedia, Social Life: Teens Reveal Their Experiences , a deep dive into the socialmedia habits of American teenagers. This research is the second wave in an ongoing study tracking teens' attitudes about socialmedia; we released our original report in 2012. MORE

These aren’t single tools to “try,” but news ways to think about how learners access media, how educators define success, and what the roles of immense digital communities should be in popularizing new learning models. MORE

This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.

As teachers, we all have assumptions -- and likely some opinions -– about teenagers and socialmedia. This research is the second wave in an ongoing study tracking teens' attitudes about socialmedia; we released our original report in 2012.

While this blog is based on verifiable data, some readers may be unhappy with my interpretation. These ads were released by the US Congress as being traced back to Russian origin, although they were liked and reshared by many Americans on socialmedia. immigration policies?

As teachers, we all have assumptions -- and likely some opinions -– about teenagers and socialmedia. This week, Common Sense is releasing its latest research report, SocialMedia, Social Life: Teens Reveal Their Experiences , a deep dive into the socialmedia habits of American teenagers. This research is the second wave in an ongoing study tracking teens' attitudes about socialmedia; we released our original report in 2012.

As teachers, we all have assumptions -- and likely some opinions -– about teenagers and socialmedia. This week, Common Sense is releasing its latest research report, SocialMedia, Social Life: Teens Reveal Their Experiences , a deep dive into the socialmedia habits of American teenagers. This research is the second wave in an ongoing study tracking teens' attitudes about socialmedia; we released our original report in 2012.

As teachers, we all have assumptions -- and likely some opinions -– about teenagers and socialmedia. This week, Common Sense is releasing its latest research report, SocialMedia, Social Life: Teens Reveal Their Experiences , a deep dive into the socialmedia habits of American teenagers. This research is the second wave in an ongoing study tracking teens' attitudes about socialmedia; we released our original report in 2012.

Everywhere we go, here and there, people always seem to have a mobile device in their hands, be it a smartphone or a tablet. It’s almost a sin not to own a mobile device. Our mobile devices are online 24/7. People in a café now usually ask the staff for the Wi-Fi password, and if there’s no Wi-Fi one can always tap the power of cellular data and stay connected to friends. Mobile learning of course.

Digital footprints are not exclusive to online shoppers or avid socialmedia users; everyone has one, including your 5-year-old child. However, “age limits” did not stop persistent pre-teens from joining socialmedia and gaming sites.

Why K–12 Students Need to Be Taught to Guard Their Data Online. A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene.

The increasing rate of students’ digital information being exposed can be, in part, chalked up to a lack of formal training and establishment of cybersecurity policies across educational institutions. When it comes to data privacy, it’s important to remain aware and be proactive.

Omaha received word that a string of text messages were posted on socialmedia threatening violence to a school. We can learn much from each other in practice and policy to ensure student data privacy stays on the forefront. First, socialmedia did not help the situation.

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps.

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps.

Digital footprints are not exclusive to online shoppers or avid socialmedia users; everyone has one, including your 5-year-old child. However, “age limits” did not stop persistent pre-teens from joining socialmedia and gaming sites.

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps.

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps.

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps.

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps.

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps.

A recent McAfee survey of 1,000 college students and recent graduates ages 18 to 25 revealed some startling statistics on how little this tech-savvy cohort knows about data security. Shockingly poor data hygiene. McAfee found that that only 36 percent of students said that they learned about personal data safety through school resources. Why K–12 Students’ Data is Valuable to Cyberattackers . Data Security Starts with Simple but Essential Steps.

At Verizon Innovative Learning Schools , every student receives a device with a data plan to support learning in and out of the classroom. Help students and families find wifi to conserve LTE data and support other devices. Remind staff about student data privacy and security.

The policy was spearheaded by the department chair, Nancy Cheever, who is part of a team at the university investigating digital distraction, an issue that, for many teachers, has graduated from a nuisance into a serious threat to learning. Related: Getting schooled in socialmedia.

The ultimate learning experience for students is both highly collaborative and extremely personalized, supported by mobile devices and digital content, reports Project Tomorrow in their latest Speak Up report.

Pokémon Go, a free augmented reality game developed by Niantic (a company spun out of Google in 2015), became the most popular mobile game in US history this year. Pokémon Go generated more than $160 million by the end of July, hitting $600 million in revenue within its first 90 days on the market – the fastest mobile game to do so. Many students cannot afford the heavy data usage required by geofencing apps, for starters. To data about students’ sexual identity?

Blog posts, socialmedia posts, images from conferences, articles, videos, you might be surprised at what you will find. 50/75/100 words are perfect for conference session proposals and socialmedia. Review these policies and talk to kids about them too.

Some individuals simply can’t afford it, while others don’t have the skill or time to navigate the array of complex policy offerings. To reach them, BIMA has partnered with mobile operators who’ve already built relationships with these potential customers. It works like this: BIMA targets individuals who already have mobile plans, essentially piggy-backing off of the trust that has been built between customers and their mobile operators.

Laptops, Chromebooks, iPads, and even cell phones are providing students with opportunities to access the internet for researching, communicating and social learning. Technology has become an integral element in our students’ educational journey.

All their suppliers must comply with this linguistic policy because even in high-tech areas, linguistics count, and many highly paid language analysts are employed. . Second, social-emotional learning is the single biggest tech trend in software. . By LeiLani Cauthen.

I created the Digital Parenting Bingo card as a way to easily show some talking points for parents that are dealing with either school-issued devices and/or personal mobile devices. Spot check the photo roll – Many of today’s socialmedia apps are very photo-driven.

As school districts search for ways to archive new data sources such as socialmedia and mobile, Google is building self-driving cars and doesn’t seem too worried about data governance for photos, Docs and other files stored in Drive.

Not long ago, mobile devices were considered perfect for any past-time activity, and had no place in the classroom. Students can play games, watch stupid videos, browse inappropriate websites, spend time on socialmedia, or catch up on the latest episodes of their favorite series.

The definition of asynchronous learning helps us understand the need for asynchronous access to this content, especially when this access is not through a dated university learning management system, but something more authentic to the student, maybe even accessed on their own mobile devices.

These aren’t single tools to “try,” but news ways to think about how learners access media, how educators define success, and what the roles of immense digital communities should be in popularizing new learning models.

The latest data from Speak Up Research Project gives insights on school to home communications. In addition, she leads several other research efforts on the impact of mobile devices, digital content and blended learning models in both K-12 and higher education.

ALA’s Policy Statement on Privacy reminds us. In its Q&A on Ethics and SocialMedia, ALA shares: As an institution, a library possesses the same ethical obligation regarding patron education and socialmedia as it does toward information presented in any format.

Then, share the resulting data and respond to the concerns of participants so that the meeting can continue positively and productively. Teachers: Model appropriate etiquette with edtech for students When I work with teachers, one obstacle they say is in the way of them letting students use mobile devices every day in their classrooms is the distraction factor. Always follow the district socialmediapolicies, but consider starting a department or team Instagram account.